60,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
  • Broschiertes Buch

The goal of this research is to show in a simulated environment that security of the network can be strengthen by first fielding the trust system and second, by dividing a network into smaller clusters, called "domains", in order to isolate anomalies or intrusions detected. In order to show this, a mathematical model of the problem will be built and translated into a software tool that at the end will receive real-life-network data as input. This program uses real world power grid representative data, outputs a network configuration that has used the concepts described above of network…mehr

Produktbeschreibung
The goal of this research is to show in a simulated environment that security of the network can be strengthen by first fielding the trust system and second, by dividing a network into smaller clusters, called "domains", in order to isolate anomalies or intrusions detected. In order to show this, a mathematical model of the problem will be built and translated into a software tool that at the end will receive real-life-network data as input. This program uses real world power grid representative data, outputs a network configuration that has used the concepts described above of network compartmentalization and strategic placing of trust nodes. As a result, this new network configuration ensures safe day-to-day operations by minimizing the effects in case of an attack or equipment malfunction of the system by subdividing the network into domains. Each domain protected by a trust node(s) without violating timing constraints.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.